Home>China>network>Cloud lock - cloud lock server security management platform

Cloud lock - cloud lock server security management platform

Country: China Type: network

Tag: server security

Chinese Websites: http://www.yunsuo.com.cn/ Enter The Website

Cloud lock is a leading host security solution, cloud lock CWPP cloud workload protection platform. Cloud lock functions include host security reinforcement, website security, application adaptive security, rasp, micro isolation, flow visualization, host security, CWPP, asve. Cloud lock can help enterprises establish an integrated security protection capability on the host side.

yunsuo

On the basis of the original host security protection of the public cloud version, the cloud lock enterprise version has added a series of functions, such as asset management, patch management, vulnerability management, baseline inspection, security operation and maintenance, micro isolation, command audit, etc., which is more in line with the host security needs of the government, central enterprises, financial and other enterprise level customers. Cloud lock Enterprise Edition supports privatization mode and SaaS mode, and SaaS mode can be opened online in real time.

Core functions:

  • Asset management: automatically identify information assets such as servers, websites, services, ports and accounts under accounts, and help administrators manage information assets from a global perspective.
  • Security operation and maintenance: it can quickly discover business risks and provide repair suggestions by integrating batch operation and maintenance, multidimensional security monitoring, baseline inspection, vulnerability scanning, patch scanning, virus scanning, Trojan back door scanning, weak password scanning and other functions.
  • Flow control: through machine learning, it can automatically identify server information and draw business topology map. At the same time, it uses micro isolation and flow visualization technology to redefine virtual network boundary and monitor internal network information flow.
  • Dynamic defense: WAF probe, rasp probe, cloud center sandbox are used to efficiently detect and intercept known and unknown network attacks, and asve (virtual security domain) and other kernel reinforcement technologies are used in the kernel layer to limit the application and administrator's rights and protect the core resources of the system.

Attack tracing: Command audit, security log, attack path tracing, tracking and management of security events to help enterprises quickly locate and repair the risk points used by hackers when they invade.